首页 | 官方网站   微博 | 高级检索  
     

基于LWE两方数相等的保密计算协议
引用本文:解丹,杨波,邵志毅,徐彦蛟,杜军强.基于LWE两方数相等的保密计算协议[J].计算机工程,2013(12):122-125.
作者姓名:解丹  杨波  邵志毅  徐彦蛟  杜军强
作者单位:陕西师范大学计算机科学学院,西安710062
基金项目:国家自然科学基金资助项目(61272436);广东省自然科学基金资助项目(10351806001000000)
摘    要:保密地比较两方数是否相等是安全多方计算(SMC)问题中重要的研究内容,其在数据挖掘、在线推荐服务、在线预定服务、医药数据库等领域有着重要应用。针对半诚实模型下两方保密比较协议无法抵抗恶意攻击的问题,提出一种恶意模型下两方数相等的保密计算协议,采用基于格上差错学习(LwE)困难性问题的公钥加密机制和Paillier加密方案,使得存在恶意攻击者的情况下能够阻止恶意攻击行为发生,同时证明协议在恶意模型下是安全的。分析结果表明,该协议执行完成后不会泄露通信双方的私有信息,与半诚实模型下两方保密比较协议相比,能有效抵抗恶意攻击者的攻击,为SMC通信提供了较好的解决方案。

关 键 词:安全多方计算  两方数相等  半诚实模型  恶意模型  差错学习困难性问题  Paillier加密方案

Secure Computation Protocol Based on LWE Two-party Numbers Equality
XIE Dan,YANG Bo,SHAO Zhi-yi,XU Yan-jiao,DU Jun-qiang.Secure Computation Protocol Based on LWE Two-party Numbers Equality[J].Computer Engineering,2013(12):122-125.
Authors:XIE Dan  YANG Bo  SHAO Zhi-yi  XU Yan-jiao  DU Jun-qiang
Affiliation:(School of Computer Science, Shaani Normal University, Xi'an 710062, China)
Abstract:The equation test is an important part in Security Multi-party Computation(SMC). It has important application in the fields of data mining, recommendation service, online dating service, and medical database. According to the defects existing in the protocols of comparing two data based on security under the semi-honesty model, this paper proposes a secure computation protocol for two-party numbers equality test in the malicious model. The protocol uses the public-key encryption mechanism based on lattice Learning With Error(LWE) difficult problem and Paillier encryption scheme, it can prevent malicious attacks in the case of existing malicious attacker, and at the same time proves that agreement is safe under the malicious model. Analysis results prove that the protocol after the implementation is completed, and no private information in both communication parties is revealed. Compared with the protocols of comparing two data based on security under the semi-honesty model, the proposed protocol can effectively resist the attacks from the malicious adversary and provides a good solution for the communication with high needs.
Keywords:Security Multi-party Computation(SMC)  two-party numbers equality  semi-honesty model  malicious model  Learning WithError(LWE) difficulty problem  Paillier encryption scheme
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号